ITAG Lunchtime Seminar Filemaker Best Practices and Service Offerings Scott Thorne, IS&T ISDA “Sensitive Data and Local Databases” MacKenzie Smith, Libraries.

Slides:



Advertisements
Similar presentations
Darton College Information Systems Use Policies. Introduction Dartons Information Systems are critical resources. The Information Systems Use Policies.
Advertisements

Page 1Version 0.1 September 2004 MITEnterprise Architecture © Copyright Massachusetts Institute of Technology 2004, All Rights Reserved Enterprise Architecture.
Identification and Disposition of Official University Records University of Texas at Arlington Records Management.
C6 Databases.
A dialogue with FMUG: Sensitive Data & Filemaker MIT Policy and Data Classifications ** DRAFT ** Guidelines Feedback and Discussion Tim McGovern 2 June.
Data Storage and Security Best Practices for storing and securing your data The goal of data storage is to ensure that your research data are in a safe.
Information Security Awareness April 13, Motivation Recent federal and state regulations and guidance Recent federal and state regulations and guidance.
Data Ownership Responsibilities & Procedures
Guide to Massachusetts Data Privacy Laws & Steps you can take towards Compliance.
1 Introduction to Database Management Systems Lila Rao Graham.
ITS Offsite Workshop 2002 PolyU IT Security Policy PolyU IT/Computer Systems Security Policy (SSP) By Ken Chung Senior Computing Officer Information Technology.
FileMaker Services and Resources Departmental Consulting and Application Development Team ITAG Lunchtime Seminar February 7, 2007.
Lab Manager Maintenance July, 2008 VMware Confidential Lab Manager 3 Training Series Module 9.
An Introduction to the Hennepin County Hennepin County GIS Technical Advisory Group (eGTAG) 10/20/2009.
Sensitive Data Accessibility Financial Management College of Education Michigan State University.
Information Technology Audit Process Business Practices Seminar Paul Toffenetti, CISA Internal Audit 29 February 2008.
Insitutional Records and Archives - J. Paul Getty Trust Archival Permanence at the J. Paul Getty Trust Getty Institutional Records and Archives ASIDIC,
Security Architecture Dr. Gabriel. Security Database security: –degree to which data is fully protected from tampering or unauthorized acts –Full understanding.
Incident Response Updated 03/20/2015
MIT Libraries’ FileMaker Use Policy as an example local DLC policy.
Patient Record System Team A DBM/381 February 4, 2013 John Italiano.
Directory and File Transfer Services Chapter 7. Learning Objectives Explain benefits offered by centralized enterprise directory services such as LDAP.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter 8.
General Awareness Training
Regional Seminar on Census Data Archiving for Africa, Addis Ababa, Ethiopia, September 2011 Overview of Archiving of Microdata Session 4 United Nations.
Computer Based Information Systems Control UAA – ACCT 316 – Fall 2003 Accounting Information Systems Dr. Fred Barbee.
DATA GOVERNANCE Presentation to CSG September 27, 2007 Mary Weisse Manager, MIT Data & Reporting Services
Applied Technology Services, Inc. Your Partner in Technology Applied Technology Services, Inc. Your Partner in Technology.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter.
1 CCNA 3 v3.1 Module 6 Switch Configuration Claes Larsen, CCAI.
Security Architecture
 Definition  Components  Advantages  Limitations Contents  Definition Definition  Functions Functions.
SEC835 Practical aspects of security implementation Part 1.
State Agencies’ Records Retention Schedule S6: Information Systems Records S6 Retention Schedules.
C6 Databases. 2 Traditional file environment Data Redundancy and Inconsistency: –Data redundancy: The presence of duplicate data in multiple data files.
INFORMATION MANAGEMENT Unit 2 SO 4 Explain the advantages of using a database approach compared to using traditional file processing; Advantages including.
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 1 Security Architecture.
Prepared By Prepared By : VINAY ALEXANDER ( विनय अलेक्सजेंड़र ) PGT(CS),KV JHAGRAKHAND.
Incident Security & Confidentiality Integrity Availability.
Update on SSN Remediation and 1-Card December 8, 2005.
Chapter 2 Securing Network Server and User Workstations.
Ch6. Introduction to Database. What is a Database? Database is a collection of related information. It is organized so that it can easily be accessed,
{ Cloud computing. Exciting and relatively new technologies allow computing to be a part of our everyday lives. Cloud computing allows users to save their.
Module 9: Designing Security for Data. Overview Creating a Security Plan for Data Creating a Design for Security of Data.
Incident Security & Confidentiality Integrity Availability.
1 TOPIC 6 DATABASE 6.1 Introduction to Database 6.2 Basic Concept of Database 6.3 Database Object DATABASE.
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 1 Security Architecture.
Workshop 2 Tutor: William Yeoh School of Computer and Information Science Secure and High Integrity System (INFT 3002)
Configuring, Managing and Maintaining Windows Server® 2008 Servers Course 6419A.
Cloud Computing By Reedy McGeady. What is Cloud Computing? Cloud Computing is using another organisations computer, which are known as hosts.
Oncology Patient Enrollment Network OPEN OPEN Documentation Lucille Patrichuk OPEN Implementation Manager OPEN Conference September 18, 2008.
TASFAA 2016 Legacy of Leadership. TASFAA 2016 Legacy of Leadership Family Educational Rights and Privacy Act (FERPA) An Overview Molly Thompson Associate.
Computer Security Sample security policy Dr Alexei Vernitski.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
Copyright © 2006 Heathkit Company, Inc. All Rights Reserved Introduction to Networking Technologies Security on Peer-to-Peer Networks.
Handling Personal Data & Security of Information Paula Trim, Information Officer, Children’s Strategic Services, Mon – Thurs 9:15-2:15.
Module 5: Designing Physical Security for Network Resources
Blackboard Security System
East Carolina University
Working at a Small-to-Medium Business or ISP – Chapter 8
Introduction to Database Management Systems
Secure Software Confidentiality Integrity Data Security Authentication
Domain 2 – Asset Security
Enterprise Architecture Guide Project at MIT CSG Presentation 9/23/04 Jerry Grochow MIT’s ITAG team sponsored a six week initiative to document the.
Information Security Seminar
Managing the IT Function
I have many checklists: how do I get started with cyber security?
Security Awareness Training: System Owners
12 STEPS TO A GDPR AWARE NETWORK
Introduction to the PACS Security
Presentation transcript:

ITAG Lunchtime Seminar Filemaker Best Practices and Service Offerings Scott Thorne, IS&T ISDA “Sensitive Data and Local Databases” MacKenzie Smith, Libraries “MIT Libraries Policy on the Use of Filemaker for Applications” Jeff Reed, Cecilia Marra, IS&T DCAD “Filemaker Service Offerings” ITAG Lunchtime Seminar Series February 7, 2007http://web.mit.edu/itag

Sensitive Data and Local Databases Feb 7th 2007 Scott Thorne

Background There is growing need to build small systems to meet departmental business needs There is growing need to build small systems to meet departmental business needs There is a growing problem of data spills There is a growing problem of data spills TJX etc TJX etc Creates potential risk for the Institute Creates potential risk for the Institute

Response Promote Awareness Promote Awareness Provide Recommendations Provide Recommendations Technical Technical Business Business Provide Resources Provide Resources

Use local database technology such as Filemaker for -- Local Applications only Local Applications only That meet the following criteria: That meet the following criteria: Relatively small & simple Relatively small & simple 50 users 50 users 20 tables or files 20 tables or files 100 fields 100 fields No Sensitive Data No Sensitive Data Use the recommended version and configuration Use the recommended version and configuration Manage data not needed by other systems Manage data not needed by other systems Warehouse Warehouse

Sensitive Data More work required to classify data and gain consensus on procedures More work required to classify data and gain consensus on procedures Extremely Sensitive Extremely Sensitive Disclosure causes harm Disclosure causes harm Financial or otherwise Financial or otherwise Organizations or Individuals Organizations or Individuals Example: SSN Example: SSN Collected with the promise of confidential treatment Collected with the promise of confidential treatment Example: Faculty Survey Information Example: Faculty Survey Information Sensitive Sensitive Choose to keep confidential, but does not cause harm Choose to keep confidential, but does not cause harm Example: Salaries Example: Salaries or more recently or more recently

Implementation Use FileMaker Server instead of peer-to-peer Use FileMaker Server instead of peer-to-peer Use Strong Passwords Use Strong Passwords Require a password for FileMaker Server Require a password for FileMaker Server Turn on SSL Turn on SSL Hide Files from network scanning (port 5003) Hide Files from network scanning (port 5003) Implement a backup and recovery procedure Implement a backup and recovery procedure Physically secure the server and backup media Physically secure the server and backup media

Data Common Sense Don't store data unless you know why Don't store data unless you know why Don't collect data that is already collected at MIT Don't collect data that is already collected at MIT Don't collect data until it's needed Don't collect data until it's needed Don't store data unless there is a plan to maintain it Don't store data unless there is a plan to maintain it Decide data retention policies before collecting data Decide data retention policies before collecting data Review data models before building a system Review data models before building a system Document the data definition and sensitivity before collection Document the data definition and sensitivity before collection Only update data in its System of Record Only update data in its System of Record

More Resources